US20110095868A1 - RFID Protection System, Device, Combination, and Related Methods - Google Patents
RFID Protection System, Device, Combination, and Related Methods Download PDFInfo
- Publication number
- US20110095868A1 US20110095868A1 US12/985,002 US98500211A US2011095868A1 US 20110095868 A1 US20110095868 A1 US 20110095868A1 US 98500211 A US98500211 A US 98500211A US 2011095868 A1 US2011095868 A1 US 2011095868A1
- Authority
- US
- United States
- Prior art keywords
- rfid
- separate
- interrogation
- blocking
- contactless circuitry
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 28
- 230000000903 blocking effect Effects 0.000 claims abstract description 96
- 230000002708 enhancing effect Effects 0.000 claims description 4
- 230000001413 cellular effect Effects 0.000 claims description 3
- 238000001514 detection method Methods 0.000 claims description 3
- 230000003287 optical effect Effects 0.000 claims description 3
- 230000004913 activation Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000007613 environmental effect Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 238000013461 design Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 239000003990 capacitor Substances 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 230000007274 generation of a signal involved in cell-cell signaling Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 239000003550 marker Substances 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/073—Special arrangements for circuits, e.g. for protecting identification code in memory
- G06K19/07309—Means for preventing undesired reading or writing from or onto record carriers
- G06K19/07318—Means for preventing undesired reading or writing from or onto record carriers by hindering electromagnetic reading or writing
- G06K19/07336—Active means, e.g. jamming or scrambling of the electromagnetic field
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/40—Jamming having variable characteristics
- H04K3/45—Jamming having variable characteristics characterized by including monitoring of the target or target signal, e.g. in reactive jammers or follower jammers for example by means of an alternation of jamming phases and monitoring phases, called "look-through mode"
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/80—Jamming or countermeasure characterized by its function
- H04K3/86—Jamming or countermeasure characterized by its function related to preventing deceptive jamming or unauthorized interrogation or access, e.g. WLAN access or RFID reading
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K2203/00—Jamming of communication; Countermeasures
- H04K2203/10—Jamming or countermeasure used for a particular application
- H04K2203/20—Jamming or countermeasure used for a particular application for contactless carriers, e.g. RFID carriers
Definitions
- the present invention relates to the field of contactless circuitry and, more particularly, to Radio Frequency Identification (“RFID”) devices and methods related to secure, confidential or proprietary data.
- RFID Radio Frequency Identification
- embodiments of the present invention beneficially provide systems, combinations, devices, and methods of enhanced RFID protection against unauthorized reading or interrogation of an RFID device.
- Applicant has recognized that factors such as expense, size, practical and flexible use requirements for RFID and other contactless chip technology create problems and barriers for widespread use in many applications.
- Embodiment of systems, combinations, devices, and methods advantageously allow users of RFID devices increased flexibility with little or no increase in expense or size and yet effectively block unauthorized access to RFID information associated with a device.
- an embodiment of the present invention provides a combination of a separate radio frequency identification (RFID) device and a separate RFID blocking device each adapted to be positioned separately into a container.
- the combination includes a separate RFID device adapted to be positioned in the container and a separate RFID blocking device adapted to be positioned adjacent the separate RFID device and in the container so that when an unauthorized RFID interrogation device attempts to read the separate RFID device from within the container the separate RFID blocking device positioned adjacent the separate RFID device blocks the attempted read and so that when an authorized user desires to use the separate RFID device for an authorized read the authorized user selectively removes either the separate RFID device or the separate RFID blocking device and presents the separate RFID device for the authorized read.
- RFID radio frequency identification
- An embodiment of a device for blocking unauthorized RFID interrogation when the device is positioned adjacent a separate RFID device includes an incoming signal detector to detect an incoming signal in an attempt to interrogate the separate RFID device and an RFID signal disruptor responsive to the detection of the incoming interrogation signal to respond to the incoming interrogation signal with disruptive read signals.
- Another embodiment of a device for blocking unauthorized RFID interrogation when the device is positioned adjacent a separate RFID device includes an incoming signal detector to detect incoming RFID interrogation signals; and an RFID interferer responsive to the incoming signal detector to interfere with activation of operation ability of the separate RFID device.
- Embodiments of methods of enhancing protection against unauthorized interrogation of an RFID or other contactless circuitry device are also provided according to the present invention.
- An embodiment of a method includes positioning a separate RFID blocking device adjacent a separate RFID device to block RFID interrogation and selectively separating the separate RFID device from the separate RFID blocking device for authorized interrogation of the separate RFID device.
- Another embodiment of method of enhanced protection against unauthorized interrogation of a contactless circuiting device includes positioning a separate contactless circuitry blocking device in association with a container and adjacent a separate contactless circuitry device to thereby block unauthorized interrogation of the separate contactless circuitry device and selectively separating the separate contactless circuitry device from being adjacent the separate contactless circuitry block device for authorized interrogation of the separate contactless circuitry device.
- embodiments of systems, combinations, devices and methods of the present invention provide flexibility, portability and user controlled protection for a user's RFID or other contactless circuitry device.
- FIG. 1 is a perspective view of a combination of a separate RFID device and a separate RFID blocking device positioned in a container according to an embodiment of the present invention
- FIG. 2 is a schematic environmental view of a separate RFID device being interrogated by an RFID interrogation device
- FIG. 3 is a schematic environment view of a combination of a separate RFID device and a separate RFID blocking device adapted to be positioned in a container according to an embodiment of the present invention
- FIG. 4 is a perspective view of an RFID device positioned in a container
- FIG. 5 is a perspective view of an RFID device positioned in a container, positioned in a pocket of a user, and being interrogated by an interrogation device;
- FIG. 6 is a perspective view of a combination of a separate RFID deice and a separate RFID blocking device positioned in a container according to another embodiment of the present invention.
- FIG. 7 is an environmental view of the combination of a separate RFID device and a separate RFID blocking device positioned in a container as illustrated in FIG. 4 , positioned in a pocket of an authorized user, and being interrogated by an unauthorized user with an RFID interrogation device according to an embodiment of the present invention;
- FIG. 8 is an environmental view of an authorized user using a separate RFID device for an authorized RFID read after selective removal of the same from a container having a combination of a separate RFID and a separate RFID blocking device positioned therein according to an embodiment of the present invention
- FIG. 9 is an environmental view of a separate REID device being returned to a container so that the container has a combination of a separate RFID device and a separate RFID blocking device according to an embodiment of the present invention
- FIG. 10 is a schematic view of an RFID device positioned in another embodiment of a container
- FIG. 11 is a schematic view of a combination of separate RFID device and a separate RFID blocking device positioned in a container according to yet another embodiment of the present invention.
- FIG. 12 is a schematic block diagram of an RFID blocking device according to an embodiment of the present invention.
- FIG. 13 is a schematic diagram of a portion of an RFID blocking circuit of an RFID blocking device according to an embodiment of the present invention.
- FIG. 14 is a schematic diagram of a portion of an REID blocking circuit of an RFID blocking device according to another embodiment of the present invention.
- FIGS. I, 6 and 8 - 9 illustrate embodiments of a combination of a separate radio frequency identification (RFID) device 30 and a separate RFID blocking device 40 each adapted to be positioned separately into or to be associated with a container 50 .
- the combination includes a separate RFID device 30 adapted to be positioned in the container 50 and a separate RFID blocking device 40 adapted to be positioned adjacent the separate RFID device and in the container.
- RFID interrogation device reading or scanning device
- the separate RFID blocking device 40 positioned adjacent the separate RFID device 30 blocks the attempted interrogation or read.
- an authorized user U desires to use the separate RFID device 30 for an authorized read, such as an authorized interrogation device S; the authorized user U can selectively remove either the separate RFID device 30 or the separate RFID blocking device 40 and present the separate RFID device 30 (within or outside of the container) for the authorized read.
- a container for example, can be selected from the group of: a wallet, a passport, a purse, a folder, a pocket, an envelope, a card holder, a sleeve, and a display mount.
- the container 50 can also include other items therein such as other credit or debit cards 54 , money, jewelry, paper or sheets as well understood by those skilled in the art.
- a container is illustrated herein as a separate holder for credit or debit cards and a passport and clip or tag for a page in a page in a passport.
- numerous other types of containers or configurations in association with a container e.g., readily removable clip or tag for a credit or debit card, can be used as well according to the present invention.
- An RFID device 30 can be a credit card, a debit card, other transaction card (e.g. telephone, gift, electronic, smart) a passport, a passport cover or page, a drivers license, or other device containing an RFID circuit or chip 33 as understood by those skilled in the art.
- FIGS. 1-9 illustrate credit or debit cards as RFID devices 30
- FIGS. 10-11 illustrate passports as RFID devices 60 . These are only for illustrative purposes and many other types of devices having RFID associated therewith can be used as well according to the present invention.
- An embodiment of a separate RFID blocking device 40 likewise can be a credit or debit card or other transaction card, tag, clip, sheet, or other device (see, e.g., FIGS. 6 , 12 , 13 , and 14 ) that also has circuitry or a chip 43 , operating as a signal interferer as understood by those skilled in the art, that includes an incoming signal detector, such as provided by receive and demodulate 100 , 102 as understood by those skilled in the art, to detect incoming signals from the unauthorized RFID interrogation device S and an RFID signal disruptor, such as provided by signal mixer and frequency generation module 90 as understood by those skilled in the art, responsive to the incoming signal detector to respond to the interrogation device S with disrupting read signals.
- an incoming signal detector such as provided by receive and demodulate 100 , 102 as understood by those skilled in the art, to detect incoming signals from the unauthorized RFID interrogation device S
- an RFID signal disruptor such as provided by signal mixer and frequency generation module 90 as understood by those skilled in the art,
- An embodiment of an RFID blocking device 40 further can include an incoming signal demodulator, such as provided by receive and demodulate 100 , 102 as understood by those skilled in the art, to demodulate a detected incoming signal, and the disruptor, such as provided by signal mixer and frequency generation module 90 as understood by those skilled in the art, can include an RFID signal generator to generate an RFID signal at the same data rate as the demodulated signal to thereby disrupt the RFID device's ability to communicate with the unauthorized interrogation device S.
- an incoming signal demodulator such as provided by receive and demodulate 100 , 102 as understood by those skilled in the art, to demodulate a detected incoming signal
- the disruptor such as provided by signal mixer and frequency generation module 90 as understood by those skilled in the art, can include an RFID signal generator to generate an RFID signal at the same data rate as the demodulated signal to thereby disrupt the RFID device's ability to communicate with the unauthorized interrogation device S.
- a separate RFID blocking device includes an incoming signal detector to detect incoming signals from the unauthorized RFID interrogation device S and an RFID interferer responsive to the incoming signal detector to interfere with activation of operation ability of the separate RFID device 30 so that the interrogation device S cannot properly read or have access to information on the RFID device.
- a separate RFID device 30 can include an anti-collision protocol, and the RFID interferer can interfere with the separate RFID device 30 so that the anti-collision protocol fails to activate.
- a separate RFID device 30 can include an anti-collision protocol, and the RFID interferer interferes with a product of the anti-collision protocol of the separate RFID device 30 when being transmitted to the unauthorized RFID interrogation device S.
- An RFID interferer for example, can include a frequency shift generator, such as provided by signal mixer and frequency generation module 90 as understood by those skilled in the art, to generate a frequency shift above and below a center frequency of an RFID communication link to the separate RFID device 30 .
- an RFID interrogation device S can be positioned separate and spaced-apart from an RFID device 30 a selected distance X and an interrogation response field 37 from the RFID device 40 is generated by the RFID device 30 in response to the interrogation.
- a second field 47 can also be generated by the RFID blocking device 40 in response to the same interrogation to thereby generate a blocking zone 59 such as by disrupting the interrogation signals, interfering with the transmitting signal from the RFID device 30 , or other blocking techniques understood by those skilled in the art.
- an RFID device 60 such as in the form of a passport or passport cover can have RFID or other contactless circuitry or chip 33 , 62 associated therewith and can generate an RF field 65 responsive to interrogation.
- An RFID or other contactless circuitry blocking device 70 such as in the form of a tag, clip, or page marker also having the RFID or other contactless blocking circuitry or chip 43 , can be attached to the passport 60 , such as one of the pages thereof, to generate an RF blocking field 75 or blocking zone 59 such as described previously.
- RFID blocking circuitry for RFID blocking devices 40 , 70 is shown in FIG. 12 and, as understood by those skilled in the art, can include one or more receiver antennas 104 , 108 to assist in receiving RFID interrogation signals, a receiver and demodulator 100 , 102 to demodulate a received interrogation signal, a power generator module 92 , 96 to generate power for the RFID blocking circuitry responsive to the received interrogation signal, and a signal mixer and frequency generation module (analog or digital) 90 to mix received signals and generate a frequency signal as understood by those skilled in the art.
- the circuitry can also include, for example, a transmitter power level controller 94 , 98 and one or more transmitter antennas 106 , 110 to assist with the transmission of the blocking RF fields or zones.
- FIGS. 13-14 illustrate two examples of more detailed antenna arrays (or inductors), capacitors, diodes, and amplifiers arranged in circuitry as understood by those skilled in the art to accomplish RFID blocking.
- an application specific integrated circuited (ASIC) can be used to interface and respond to an antenna array in a low power design such as shown in FIG. 13 , the low power ASIC can have digital sampling to detect incoming signals from the interrogation device S, then use various signal generation or frequency generation techniques as understood by those skilled in the art to respond with disruptive patterns.
- ASIC application specific integrated circuited
- RFID circuitry or chips often have an anti-collision protocol or program that allow multiple chips to talk to a single interrogation device S.
- This technique can generate an interference with the RFID's ability to activate anti-collision protocol(s).
- the anti-collision protocol(s) can be stopped before activation, the product or result of the protocol can be attacked or interfaced with during generation or transmission, or both.
- a frequency shift generation for example, above and/or below a center frequency of an RFID communication link can be produced by the blocking circuitry.
- an analog or discrete design can demodulate the incoming signal from the interrogation devices, and then broadcast back out at that data rate to suppress the ability of the RFID device 30 , 60 (or circuitry 33 , 62 ) to communicate.
- these are only a few effective examples according to embodiments of systems, combinations, devices and methods of the present invention, other examples and techniques according to the present invention will be apparent to those skilled in the art.
- an embodiment of a method of enhancing protection against unauthorized interrogation of an RFID device 30 includes positioning a separate RFID blocking device 40 adjacent a separate RFID device 30 to block RFID interrogation and selectively separating the separate RFID device 30 from the separate RFID blocking device 40 for authorized interrogation of the separate RFID device 30 .
- the positioning can include either the separate RFID blocking device 40 , 70 or the separate RFID device 30 , 60 being in a container 50 , 60 prior to positioning the separate RFID blocking device 40 , 70 adjacent the separate RFID device 30 , 60 .
- the blocked RFID interrogation includes an unauthorized RFID interrogation, and the container, for example, can be selected from the group of: a wallet, a passport, a purse, a folder, a pocket, an envelope, a sleeve, a card holder, and a display mount.
- the blocking of the RFID interrogation for example, interferes with the activation of an anti-collision protocol associated with the separate RFID device or interferes with the transmission of an anti-collision protocol associated with the separate MD device or alternatively, for example, the blocking of the RFID interrogation can include providing disrupting read signals responsive to an attempted interrogation of the separate RFID device.
- Another embodiment of a method of enhanced protection against unauthorized interrogation of a contactless circuiting device includes positioning a separate contactless circuitry blocking device in association with a container and adjacent a separate contactless circuitry device to thereby block unauthorized interrogation of the separate contactless circuitry device and selectively separating the separate contactless circuitry device from being adjacent the separate contactless circuitry block device for authorized interrogation of the separate contactless circuitry device.
- Contactless circuitry of the separate contactless circuitry device for example, can be selected from the group of: RFID, Infrared, Bluetooth, WI-FI, radio frequency microwave frequency, cellular frequency, global positioning system and optical.
Abstract
Description
- This is a divisional patent application of, and claims priority and the benefit of, U.S. Ser. No. 11/581,896, filed Oct. 17, 2006, titled “RFID Protection System, Device, Combination, and Related Methods,” which claims priority and benefit to provisional patent U.S. Ser. No. 60/731,750, filed Oct. 31, 2005, titled “RFID Protection System, Device, Combination, and Related Methods,” each incorporated herein by reference in its entirety.
- 1. Field of the Invention
- The present invention relates to the field of contactless circuitry and, more particularly, to Radio Frequency Identification (“RFID”) devices and methods related to secure, confidential or proprietary data.
- 2. Description of Related Art
- Theft of credit or debit card information and identification has become rampant worldwide. Governments, companies, and consumers spend millions of dollars each year to prevent and pursue such thefts.
- Over the years, various types of identification technology have been used for credit or debit cards and for identification. These, for example, have included pin numbers, bar codes, and magnetic strips. More recently, however, steps have been taken to use RFID or other contactless chip technology in association with credit or debit cards, passports, documents, and other areas where identification, including portable and remote, are desired. An example of such applications of RFID can be seen in a recent news article titled “Contactless Traveling” by Wright (Electronic Design News (EDN) Jul. 7, 2005) for passport applications.
- Nevertheless, the recent developments in technology still do not fully address potential security breaches of the RFID such as when an unauthorized RFID interrogation or reading device attempts to extract the RFID information, especially when a user or possessor of an RFID device is unsuspecting or not cognizant that the MD device is being interrogated.
- Others have attempted solutions at blocking RFID devices to enhance privacy. Examples can be seen in U.S. Patent Application Publication No. 2004/0222878 A1 by Juels titled “Low-Complexity Cryptographic Techniques For Use With Radio Frequency Identification Devices”, U.S. Patent Application Publication No. 2004/0223481 A1 by Juels, et al. titled “Method and Apparatus For Selective Blocking of Radio Frequency Identification Devices”, and U.S. Patent Application Publication No. 2005/0099268 A1 by Juels, et al. titled “Radio Frequency Identification System With Privacy Policy Implementation Based on Device Classification”. There are still needs, however, for enhanced, simple, flexible, and practical security and privacy protection for RFID and other contactless circuitry or chip devices.
- In view of the foregoing, embodiments of the present invention beneficially provide systems, combinations, devices, and methods of enhanced RFID protection against unauthorized reading or interrogation of an RFID device. For example, Applicant has recognized that factors such as expense, size, practical and flexible use requirements for RFID and other contactless chip technology create problems and barriers for widespread use in many applications. Embodiment of systems, combinations, devices, and methods advantageously allow users of RFID devices increased flexibility with little or no increase in expense or size and yet effectively block unauthorized access to RFID information associated with a device.
- More particularly, an embodiment of the present invention provides a combination of a separate radio frequency identification (RFID) device and a separate RFID blocking device each adapted to be positioned separately into a container. The combination includes a separate RFID device adapted to be positioned in the container and a separate RFID blocking device adapted to be positioned adjacent the separate RFID device and in the container so that when an unauthorized RFID interrogation device attempts to read the separate RFID device from within the container the separate RFID blocking device positioned adjacent the separate RFID device blocks the attempted read and so that when an authorized user desires to use the separate RFID device for an authorized read the authorized user selectively removes either the separate RFID device or the separate RFID blocking device and presents the separate RFID device for the authorized read.
- An embodiment of a device for blocking unauthorized RFID interrogation when the device is positioned adjacent a separate RFID device includes an incoming signal detector to detect an incoming signal in an attempt to interrogate the separate RFID device and an RFID signal disruptor responsive to the detection of the incoming interrogation signal to respond to the incoming interrogation signal with disruptive read signals.
- Another embodiment of a device for blocking unauthorized RFID interrogation when the device is positioned adjacent a separate RFID device includes an incoming signal detector to detect incoming RFID interrogation signals; and an RFID interferer responsive to the incoming signal detector to interfere with activation of operation ability of the separate RFID device.
- Embodiments of methods of enhancing protection against unauthorized interrogation of an RFID or other contactless circuitry device are also provided according to the present invention. An embodiment of a method includes positioning a separate RFID blocking device adjacent a separate RFID device to block RFID interrogation and selectively separating the separate RFID device from the separate RFID blocking device for authorized interrogation of the separate RFID device. Another embodiment of method of enhanced protection against unauthorized interrogation of a contactless circuiting device includes positioning a separate contactless circuitry blocking device in association with a container and adjacent a separate contactless circuitry device to thereby block unauthorized interrogation of the separate contactless circuitry device and selectively separating the separate contactless circuitry device from being adjacent the separate contactless circuitry block device for authorized interrogation of the separate contactless circuitry device.
- By providing user separable RFID or other contactless circuitry blocking devices and RFID or other contactless circuitry devices, embodiments of systems, combinations, devices and methods of the present invention provide flexibility, portability and user controlled protection for a user's RFID or other contactless circuitry device.
- Some of the features and benefits of the present invention having been stated, others will become apparent as the description proceeds when taken in conjunction with the accompanying drawings, in which:
-
FIG. 1 is a perspective view of a combination of a separate RFID device and a separate RFID blocking device positioned in a container according to an embodiment of the present invention; -
FIG. 2 is a schematic environmental view of a separate RFID device being interrogated by an RFID interrogation device; -
FIG. 3 is a schematic environment view of a combination of a separate RFID device and a separate RFID blocking device adapted to be positioned in a container according to an embodiment of the present invention; -
FIG. 4 is a perspective view of an RFID device positioned in a container; -
FIG. 5 is a perspective view of an RFID device positioned in a container, positioned in a pocket of a user, and being interrogated by an interrogation device; -
FIG. 6 is a perspective view of a combination of a separate RFID deice and a separate RFID blocking device positioned in a container according to another embodiment of the present invention; -
FIG. 7 is an environmental view of the combination of a separate RFID device and a separate RFID blocking device positioned in a container as illustrated inFIG. 4 , positioned in a pocket of an authorized user, and being interrogated by an unauthorized user with an RFID interrogation device according to an embodiment of the present invention; -
FIG. 8 is an environmental view of an authorized user using a separate RFID device for an authorized RFID read after selective removal of the same from a container having a combination of a separate RFID and a separate RFID blocking device positioned therein according to an embodiment of the present invention; -
FIG. 9 is an environmental view of a separate REID device being returned to a container so that the container has a combination of a separate RFID device and a separate RFID blocking device according to an embodiment of the present invention; -
FIG. 10 is a schematic view of an RFID device positioned in another embodiment of a container; -
FIG. 11 is a schematic view of a combination of separate RFID device and a separate RFID blocking device positioned in a container according to yet another embodiment of the present invention; -
FIG. 12 is a schematic block diagram of an RFID blocking device according to an embodiment of the present invention; -
FIG. 13 is a schematic diagram of a portion of an RFID blocking circuit of an RFID blocking device according to an embodiment of the present invention; and -
FIG. 14 is a schematic diagram of a portion of an REID blocking circuit of an RFID blocking device according to another embodiment of the present invention. - The present invention now will be described more fully hereinafter with reference to the accompanying drawings in which embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the illustrated embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Like numbers refer to like elements throughout.
- FIGS. I, 6 and 8-9 illustrate embodiments of a combination of a separate radio frequency identification (RFID)
device 30 and a separateRFID blocking device 40 each adapted to be positioned separately into or to be associated with acontainer 50. The combination includes aseparate RFID device 30 adapted to be positioned in thecontainer 50 and a separateRFID blocking device 40 adapted to be positioned adjacent the separate RFID device and in the container. When an unauthorized RFID interrogation, reading or scanning device (“interrogation device”) S attempts to read theseparate RFID device 30 from within thecontainer 50, the separateRFID blocking device 40 positioned adjacent theseparate RFID device 30 blocks the attempted interrogation or read. When an authorized user U desires to use theseparate RFID device 30 for an authorized read, such as an authorized interrogation device S; the authorized user U can selectively remove either theseparate RFID device 30 or the separateRFID blocking device 40 and present the separate RFID device 30 (within or outside of the container) for the authorized read. - A container, for example, can be selected from the group of: a wallet, a passport, a purse, a folder, a pocket, an envelope, a card holder, a sleeve, and a display mount. The
container 50 can also include other items therein such as other credit ordebit cards 54, money, jewelry, paper or sheets as well understood by those skilled in the art. A container is illustrated herein as a separate holder for credit or debit cards and a passport and clip or tag for a page in a page in a passport. As understood by those skilled in the art, however, numerous other types of containers or configurations in association with a container, e.g., readily removable clip or tag for a credit or debit card, can be used as well according to the present invention. - An
RFID device 30, for example, can be a credit card, a debit card, other transaction card (e.g. telephone, gift, electronic, smart) a passport, a passport cover or page, a drivers license, or other device containing an RFID circuit orchip 33 as understood by those skilled in the art.FIGS. 1-9 illustrate credit or debit cards asRFID devices 30, andFIGS. 10-11 illustrate passports asRFID devices 60. These are only for illustrative purposes and many other types of devices having RFID associated therewith can be used as well according to the present invention. - An embodiment of a separate
RFID blocking device 40, for example, likewise can be a credit or debit card or other transaction card, tag, clip, sheet, or other device (see, e.g.,FIGS. 6 , 12, 13, and 14) that also has circuitry or achip 43, operating as a signal interferer as understood by those skilled in the art, that includes an incoming signal detector, such as provided by receive and demodulate 100, 102 as understood by those skilled in the art, to detect incoming signals from the unauthorized RFID interrogation device S and an RFID signal disruptor, such as provided by signal mixer andfrequency generation module 90 as understood by those skilled in the art, responsive to the incoming signal detector to respond to the interrogation device S with disrupting read signals. An embodiment of anRFID blocking device 40, for example, further can include an incoming signal demodulator, such as provided by receive and demodulate 100, 102 as understood by those skilled in the art, to demodulate a detected incoming signal, and the disruptor, such as provided by signal mixer andfrequency generation module 90 as understood by those skilled in the art, can include an RFID signal generator to generate an RFID signal at the same data rate as the demodulated signal to thereby disrupt the RFID device's ability to communicate with the unauthorized interrogation device S. - Another embodiment of a separate RFID blocking device includes an incoming signal detector to detect incoming signals from the unauthorized RFID interrogation device S and an RFID interferer responsive to the incoming signal detector to interfere with activation of operation ability of the
separate RFID device 30 so that the interrogation device S cannot properly read or have access to information on the RFID device. For example, aseparate RFID device 30 can include an anti-collision protocol, and the RFID interferer can interfere with theseparate RFID device 30 so that the anti-collision protocol fails to activate. - Alternatively, for example, a
separate RFID device 30 can include an anti-collision protocol, and the RFID interferer interferes with a product of the anti-collision protocol of theseparate RFID device 30 when being transmitted to the unauthorized RFID interrogation device S. An RFID interferer, for example, can include a frequency shift generator, such as provided by signal mixer andfrequency generation module 90 as understood by those skilled in the art, to generate a frequency shift above and below a center frequency of an RFID communication link to theseparate RFID device 30. - For example, as shown in
FIGS. 2-3 , an RFID interrogation device S can be positioned separate and spaced-apart from an RFID device 30 a selected distance X and aninterrogation response field 37 from theRFID device 40 is generated by theRFID device 30 in response to the interrogation. Then, for example, asecond field 47 can also be generated by theRFID blocking device 40 in response to the same interrogation to thereby generate a blockingzone 59 such as by disrupting the interrogation signals, interfering with the transmitting signal from theRFID device 30, or other blocking techniques understood by those skilled in the art. - Likewise, as shown in
FIGS. 10-11 , anRFID device 60 such as in the form of a passport or passport cover can have RFID or other contactless circuitry orchip RF field 65 responsive to interrogation. An RFID or other contactless circuitry blocking device 70, such as in the form of a tag, clip, or page marker also having the RFID or other contactless blocking circuitry orchip 43, can be attached to thepassport 60, such as one of the pages thereof, to generate anRF blocking field 75 or blockingzone 59 such as described previously. - An example of RFID blocking circuitry for
RFID blocking devices 40, 70 is shown inFIG. 12 and, as understood by those skilled in the art, can include one ormore receiver antennas demodulator power generator module power level controller more transmitter antennas FIGS. 13-14 illustrate two examples of more detailed antenna arrays (or inductors), capacitors, diodes, and amplifiers arranged in circuitry as understood by those skilled in the art to accomplish RFID blocking. For example, as understood by those skilled in the art, an application specific integrated circuited (ASIC) can be used to interface and respond to an antenna array in a low power design such as shown inFIG. 13 , the low power ASIC can have digital sampling to detect incoming signals from the interrogation device S, then use various signal generation or frequency generation techniques as understood by those skilled in the art to respond with disruptive patterns. - For example, as understood by those skilled in the art, RFID circuitry or chips often have an anti-collision protocol or program that allow multiple chips to talk to a single interrogation device S. This technique can generate an interference with the RFID's ability to activate anti-collision protocol(s). Depending on the desires of the designer of the RFID blocking circuitry, the anti-collision protocol(s) can be stopped before activation, the product or result of the protocol can be attacked or interfaced with during generation or transmission, or both. A frequency shift generation, for example, above and/or below a center frequency of an RFID communication link can be produced by the blocking circuitry.
- Alternatively, such as shown in
FIG. 14 , an analog or discrete design can demodulate the incoming signal from the interrogation devices, and then broadcast back out at that data rate to suppress the ability of theRFID device 30, 60 (orcircuitry 33, 62) to communicate. As understood by those skilled in the art, these are only a few effective examples according to embodiments of systems, combinations, devices and methods of the present invention, other examples and techniques according to the present invention will be apparent to those skilled in the art. - As illustrated in
FIGS. 1-14 , embodiments of the present invention also include methods of enhancing protection against unauthorized access to RFID or other contactless chip devices. For example, an embodiment of a method of enhancing protection against unauthorized interrogation of anRFID device 30 includes positioning a separateRFID blocking device 40 adjacent aseparate RFID device 30 to block RFID interrogation and selectively separating theseparate RFID device 30 from the separateRFID blocking device 40 for authorized interrogation of theseparate RFID device 30. The positioning, for example, can include either the separateRFID blocking device 40, 70 or theseparate RFID device container RFID blocking device 40, 70 adjacent theseparate RFID device - Another embodiment of a method of enhanced protection against unauthorized interrogation of a contactless circuiting device includes positioning a separate contactless circuitry blocking device in association with a container and adjacent a separate contactless circuitry device to thereby block unauthorized interrogation of the separate contactless circuitry device and selectively separating the separate contactless circuitry device from being adjacent the separate contactless circuitry block device for authorized interrogation of the separate contactless circuitry device. Contactless circuitry of the separate contactless circuitry device, for example, can be selected from the group of: RFID, Infrared, Bluetooth, WI-FI, radio frequency microwave frequency, cellular frequency, global positioning system and optical.
- Many modifications and other embodiments of the invention will come to the mind of one skilled in the art having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the invention is not to be limited to the illustrated embodiments disclosed, and that modifications and other embodiments are intended to be included within the scope of the appended claims.
Claims (14)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/985,002 US8237549B2 (en) | 2005-10-31 | 2011-01-05 | RFID protection system, device, combination, and related methods |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US73175005P | 2005-10-31 | 2005-10-31 | |
US11/581,896 US7889056B2 (en) | 2005-10-31 | 2006-10-17 | RFID protection system, device, combination, and related methods |
US12/985,002 US8237549B2 (en) | 2005-10-31 | 2011-01-05 | RFID protection system, device, combination, and related methods |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/581,896 Division US7889056B2 (en) | 2005-10-31 | 2006-10-17 | RFID protection system, device, combination, and related methods |
Publications (2)
Publication Number | Publication Date |
---|---|
US20110095868A1 true US20110095868A1 (en) | 2011-04-28 |
US8237549B2 US8237549B2 (en) | 2012-08-07 |
Family
ID=37995566
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/581,896 Expired - Fee Related US7889056B2 (en) | 2005-10-31 | 2006-10-17 | RFID protection system, device, combination, and related methods |
US12/985,002 Active US8237549B2 (en) | 2005-10-31 | 2011-01-05 | RFID protection system, device, combination, and related methods |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/581,896 Expired - Fee Related US7889056B2 (en) | 2005-10-31 | 2006-10-17 | RFID protection system, device, combination, and related methods |
Country Status (1)
Country | Link |
---|---|
US (2) | US7889056B2 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013116532A1 (en) * | 2012-01-31 | 2013-08-08 | Tumi, Inc. | Rfid-shielded articles and methods thereof |
US20140313015A1 (en) * | 2013-04-18 | 2014-10-23 | Symbol Technologies, Inc. | Defining a radio frequency identification read area |
US11379676B2 (en) * | 2020-04-01 | 2022-07-05 | Nec Corporation | RFID-based self-checkout systems using cycle counting |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7540426B1 (en) | 2002-11-07 | 2009-06-02 | American Express Travel Related Services Company, Inc. | Foldable transaction cards and methods of making the same |
US7278584B1 (en) * | 2002-11-07 | 2007-10-09 | American Express Travel Related Services Company, Inc. | Portable electronic music devices with convenient or foldable transaction cards |
US7721956B2 (en) | 2003-12-10 | 2010-05-25 | American Express Travel Related Services Company, Inc. | Foldable transaction card systems |
CN101184410A (en) * | 2005-06-03 | 2008-05-21 | 史蒂夫盖瑞·欧肖 | Carrying devices for RF tokens |
FR2904880B1 (en) * | 2006-08-11 | 2008-10-10 | Ask Sa | SECURITY DEVICE INTEGRATED WITH CONTACTLESS OBJECT OF SECURE DOCUMENT TYPE WITH RADIO FREQUENCY DEVICE. |
FR2908205B1 (en) * | 2006-11-03 | 2009-02-27 | Xiring Sa | DEVICE FOR PROTECTING FRAUD FROM CONTACTLESS COMMUNICATION OBJECTS |
US20100097237A1 (en) * | 2007-03-01 | 2010-04-22 | Peter Nygaard Christiansen | Safety device |
US20090053996A1 (en) * | 2007-08-20 | 2009-02-26 | Jean Pierre Enguent | Active Signal Interference |
US20090260731A1 (en) * | 2008-04-18 | 2009-10-22 | Id Armor Inc. | Dielectric smart card protector sleeve |
US20100116702A1 (en) * | 2008-11-10 | 2010-05-13 | Philip Schentrup | Mobile Device Card Keeper |
US8902073B2 (en) * | 2009-02-10 | 2014-12-02 | Cubic Corporation | Smartcard protection device |
US20100230018A1 (en) * | 2009-03-13 | 2010-09-16 | Nielsen Cynthia A | Theft deterrent anti-scanning device |
US8578982B2 (en) | 2011-06-28 | 2013-11-12 | Victor Lee | Scanner resistant device for RFID cards |
US8763914B2 (en) * | 2012-01-17 | 2014-07-01 | On Track Innovations Ltd. | Decoupled contactless bi-directional systems and methods |
CN104969594A (en) * | 2012-12-05 | 2015-10-07 | 哈利斯蒂斯有限公司 | Inhibiting unauthorised contactless reading of a contactless readable object |
WO2014171955A1 (en) | 2013-04-19 | 2014-10-23 | Curio Ltd. | Rfid disruption device and related methods |
CH709506A2 (en) * | 2014-04-14 | 2015-10-15 | Quantec Sa | Portable transceiver device encrypted audio streams and associated method. |
US11308462B2 (en) | 2014-05-13 | 2022-04-19 | Clear Token Inc | Secure electronic payment |
US9986808B2 (en) | 2015-06-08 | 2018-06-05 | Donald Mitchell Halpern | Locking drawstring bag |
US9990574B2 (en) | 2015-11-27 | 2018-06-05 | Joseph James Strong | Holder for RFID enabled cards |
CA3016432A1 (en) * | 2016-03-01 | 2017-09-08 | James Carey | Protection of personal data contained on an rfid-enabled device |
US9654167B1 (en) | 2016-08-25 | 2017-05-16 | Lindsay E. White | Smartphone case system |
US11071363B2 (en) | 2018-08-28 | 2021-07-27 | Elad Burko | Thin card sized wallet |
Citations (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4631708A (en) * | 1981-12-18 | 1986-12-23 | Senelco Limited | Transmitter/responder systems |
US4931788A (en) * | 1986-12-05 | 1990-06-05 | Meridian Micro-Systems Ltd. | Transponder and interrogator |
US5083111A (en) * | 1990-11-26 | 1992-01-21 | Sensormatic Electronics Corporation | Jamming apparatus for electronic article surveillance systems |
US5847662A (en) * | 1994-12-27 | 1998-12-08 | Kabushiki Kaisha Toshiba | Radio card communication apparatus |
US6121544A (en) * | 1998-01-15 | 2000-09-19 | Petsinger; Julie Ann | Electromagnetic shield to prevent surreptitious access to contactless smartcards |
US6195529B1 (en) * | 1998-03-12 | 2001-02-27 | Joachim Linz | Transmission blocker for mobile radio stations and method for preventing transmission activities of a mobile radio station |
US6473031B1 (en) * | 2000-10-16 | 2002-10-29 | Scott C. Harris | Position privacy in an electronic device |
US6580432B1 (en) * | 2000-01-14 | 2003-06-17 | Ati International Srl | Spread spectrum FIFO and method for storing data for multiple display types |
US20030143943A1 (en) * | 2002-01-24 | 2003-07-31 | Kline Paul A. | Selective wireless communication blocker |
US6687506B1 (en) * | 1997-06-02 | 2004-02-03 | Raoul Girod | Radiotelephone filtering apparatus |
US20040223481A1 (en) * | 2003-05-08 | 2004-11-11 | Ari Juels | Method and apparatus for selective blocking of radio frequency identification devices |
US20040222878A1 (en) * | 2003-05-06 | 2004-11-11 | Ari Juels | Low-complexity cryptographic techniques for use with radio frequency identification devices |
US6892052B2 (en) * | 2002-03-26 | 2005-05-10 | Nokia Corporation | Radio frequency identification (RF-ID) based discovery for short range radio communication |
US20050099268A1 (en) * | 2003-11-12 | 2005-05-12 | Ari Juels | Radio frequency identification system with privacy policy implementation based on device classification |
US20050156711A1 (en) * | 2002-10-18 | 2005-07-21 | Aeroscout, Ltd. | Radio-frequency identification (RFID) tag employing unique reception window and method therefor |
US6925287B2 (en) * | 2001-02-06 | 2005-08-02 | Koninklijke Philips Electronics N.V. | Signalling system and a transponder for use in the system |
US6978146B1 (en) * | 2003-11-21 | 2005-12-20 | Joseph Yardman | Device for blocking cellular phone signals |
US7075437B2 (en) * | 2003-01-13 | 2006-07-11 | Symbol Technologies, Inc. | RFID relay device and methods for relaying and RFID signal |
US7083083B2 (en) * | 2004-04-27 | 2006-08-01 | Nagraid S.A. | Portable information carrier with transponders |
US7088248B2 (en) * | 2004-03-24 | 2006-08-08 | Avery Dennison Corporation | System and method for selectively reading RFID devices |
US7103310B2 (en) * | 2002-05-30 | 2006-09-05 | Nortel Networks Limited | Method of restricting the use of a radio terminal and an associated restriction device |
US20060286938A1 (en) * | 1998-01-29 | 2006-12-21 | Murdoch Graham A M | Methods and devices for the suppression of harmonics |
US7221900B2 (en) * | 2002-11-21 | 2007-05-22 | Kimberly-Clark Worldwide, Inc. | Jamming device against RFID smart tag systems |
US7289761B2 (en) * | 2003-06-23 | 2007-10-30 | Cardiac Pacemakers, Inc. | Systems, devices, and methods for selectively preventing data transfer from a medical device |
US20070289775A1 (en) * | 2005-08-16 | 2007-12-20 | Potts Kevin L | Rfid shielding devices |
US7336186B2 (en) * | 2004-07-26 | 2008-02-26 | Yamaha Corporation | RFID tag-containing apparatus and RFID tag-containing seal |
US20080256642A1 (en) * | 2007-04-16 | 2008-10-16 | John Hachey | Anti-Interrogation For Portable Device |
US20080303632A1 (en) * | 2007-06-11 | 2008-12-11 | Ayman Hammad | Shielding of portable consumer device |
US20090021343A1 (en) * | 2006-05-10 | 2009-01-22 | Airdefense, Inc. | RFID Intrusion Protection System and Methods |
US7501953B2 (en) * | 2004-04-13 | 2009-03-10 | Impinj Inc | RFID readers transmitting preambles denoting communication parameters and RFID tags interpreting the same and methods |
US7522905B2 (en) * | 2005-06-24 | 2009-04-21 | Visa U.S.A. Inc. | Apparatus and method for preventing wireless interrogation of portable consumer devices |
US7671741B2 (en) * | 2005-07-27 | 2010-03-02 | Lax Michael R | Anti-theft security device and perimeter detection system |
-
2006
- 2006-10-17 US US11/581,896 patent/US7889056B2/en not_active Expired - Fee Related
-
2011
- 2011-01-05 US US12/985,002 patent/US8237549B2/en active Active
Patent Citations (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4631708A (en) * | 1981-12-18 | 1986-12-23 | Senelco Limited | Transmitter/responder systems |
US4931788A (en) * | 1986-12-05 | 1990-06-05 | Meridian Micro-Systems Ltd. | Transponder and interrogator |
US5083111A (en) * | 1990-11-26 | 1992-01-21 | Sensormatic Electronics Corporation | Jamming apparatus for electronic article surveillance systems |
US5847662A (en) * | 1994-12-27 | 1998-12-08 | Kabushiki Kaisha Toshiba | Radio card communication apparatus |
US6687506B1 (en) * | 1997-06-02 | 2004-02-03 | Raoul Girod | Radiotelephone filtering apparatus |
US6121544A (en) * | 1998-01-15 | 2000-09-19 | Petsinger; Julie Ann | Electromagnetic shield to prevent surreptitious access to contactless smartcards |
US20060286938A1 (en) * | 1998-01-29 | 2006-12-21 | Murdoch Graham A M | Methods and devices for the suppression of harmonics |
US6195529B1 (en) * | 1998-03-12 | 2001-02-27 | Joachim Linz | Transmission blocker for mobile radio stations and method for preventing transmission activities of a mobile radio station |
US6580432B1 (en) * | 2000-01-14 | 2003-06-17 | Ati International Srl | Spread spectrum FIFO and method for storing data for multiple display types |
US6473031B1 (en) * | 2000-10-16 | 2002-10-29 | Scott C. Harris | Position privacy in an electronic device |
US6925287B2 (en) * | 2001-02-06 | 2005-08-02 | Koninklijke Philips Electronics N.V. | Signalling system and a transponder for use in the system |
US20030143943A1 (en) * | 2002-01-24 | 2003-07-31 | Kline Paul A. | Selective wireless communication blocker |
US6892052B2 (en) * | 2002-03-26 | 2005-05-10 | Nokia Corporation | Radio frequency identification (RF-ID) based discovery for short range radio communication |
US7103310B2 (en) * | 2002-05-30 | 2006-09-05 | Nortel Networks Limited | Method of restricting the use of a radio terminal and an associated restriction device |
US20050156711A1 (en) * | 2002-10-18 | 2005-07-21 | Aeroscout, Ltd. | Radio-frequency identification (RFID) tag employing unique reception window and method therefor |
US7221900B2 (en) * | 2002-11-21 | 2007-05-22 | Kimberly-Clark Worldwide, Inc. | Jamming device against RFID smart tag systems |
US7075437B2 (en) * | 2003-01-13 | 2006-07-11 | Symbol Technologies, Inc. | RFID relay device and methods for relaying and RFID signal |
US20040222878A1 (en) * | 2003-05-06 | 2004-11-11 | Ari Juels | Low-complexity cryptographic techniques for use with radio frequency identification devices |
US6970070B2 (en) * | 2003-05-08 | 2005-11-29 | Rsa Security Inc. | Method and apparatus for selective blocking of radio frequency identification devices |
US20040223481A1 (en) * | 2003-05-08 | 2004-11-11 | Ari Juels | Method and apparatus for selective blocking of radio frequency identification devices |
US7289761B2 (en) * | 2003-06-23 | 2007-10-30 | Cardiac Pacemakers, Inc. | Systems, devices, and methods for selectively preventing data transfer from a medical device |
US7298243B2 (en) * | 2003-11-12 | 2007-11-20 | Rsa Security Inc. | Radio frequency identification system with privacy policy implementation based on device classification |
US20050099268A1 (en) * | 2003-11-12 | 2005-05-12 | Ari Juels | Radio frequency identification system with privacy policy implementation based on device classification |
US6978146B1 (en) * | 2003-11-21 | 2005-12-20 | Joseph Yardman | Device for blocking cellular phone signals |
US7088248B2 (en) * | 2004-03-24 | 2006-08-08 | Avery Dennison Corporation | System and method for selectively reading RFID devices |
US7501953B2 (en) * | 2004-04-13 | 2009-03-10 | Impinj Inc | RFID readers transmitting preambles denoting communication parameters and RFID tags interpreting the same and methods |
US7083083B2 (en) * | 2004-04-27 | 2006-08-01 | Nagraid S.A. | Portable information carrier with transponders |
US7336186B2 (en) * | 2004-07-26 | 2008-02-26 | Yamaha Corporation | RFID tag-containing apparatus and RFID tag-containing seal |
US7522905B2 (en) * | 2005-06-24 | 2009-04-21 | Visa U.S.A. Inc. | Apparatus and method for preventing wireless interrogation of portable consumer devices |
US7671741B2 (en) * | 2005-07-27 | 2010-03-02 | Lax Michael R | Anti-theft security device and perimeter detection system |
US20070289775A1 (en) * | 2005-08-16 | 2007-12-20 | Potts Kevin L | Rfid shielding devices |
US20090021343A1 (en) * | 2006-05-10 | 2009-01-22 | Airdefense, Inc. | RFID Intrusion Protection System and Methods |
US20080256642A1 (en) * | 2007-04-16 | 2008-10-16 | John Hachey | Anti-Interrogation For Portable Device |
US20080303632A1 (en) * | 2007-06-11 | 2008-12-11 | Ayman Hammad | Shielding of portable consumer device |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013116532A1 (en) * | 2012-01-31 | 2013-08-08 | Tumi, Inc. | Rfid-shielded articles and methods thereof |
US20140313015A1 (en) * | 2013-04-18 | 2014-10-23 | Symbol Technologies, Inc. | Defining a radio frequency identification read area |
US9158945B2 (en) * | 2013-04-18 | 2015-10-13 | Symbol Technologies, Llc | Defining a radio frequency identification read area |
US11379676B2 (en) * | 2020-04-01 | 2022-07-05 | Nec Corporation | RFID-based self-checkout systems using cycle counting |
Also Published As
Publication number | Publication date |
---|---|
US7889056B2 (en) | 2011-02-15 |
US8237549B2 (en) | 2012-08-07 |
US20070096924A1 (en) | 2007-05-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8237549B2 (en) | RFID protection system, device, combination, and related methods | |
US8305193B2 (en) | RFID protection device, and related methods | |
US10572790B2 (en) | RFID disruption device and related methods | |
EP1760629B1 (en) | Reader/writer and communication method thereof | |
EP2250631B1 (en) | Methods and apparatus for preserving privacy in an rfid system | |
US8487828B2 (en) | Shielded contactless electronic document | |
US8976010B2 (en) | Security system for at least an integrated circuit, secure integrated circuit card, and method of secure wireless communications | |
RU2437150C2 (en) | Device to read radiofrequency identification for document | |
US9697453B2 (en) | Wireless device security system | |
US20090152363A1 (en) | Smart card and anti-skimming system including the same | |
JP2007512611A (en) | Jammer for tag & smart card | |
US20070290858A1 (en) | Apparatus for storing and wirelessly transmitting data | |
US8060005B2 (en) | Method and device for providing active security to a contact-free electronic device | |
US20190266463A1 (en) | RFID protection and low frequency signal isolation sheet for folding wallet | |
CN205354107U (en) | Consumptive material anti -counterfeit device based on radio frequency identification RFID | |
CN101739591A (en) | Radio frequency card and radio frequency communication equipment capable of protecting safe communication, and application method thereof | |
US20110042133A1 (en) | Card guard | |
CN205810386U (en) | A kind of shielding part and be provided with the wallet of this shielding part | |
KR101619219B1 (en) | Method for identifying counterfeit using the same | |
US8314706B2 (en) | Coupled radio frequency identification (RFID) and biometric device | |
WO2009064611A1 (en) | Rfid based identification device | |
KR200176178Y1 (en) | A smart card equipped with radio frequency tag | |
Jain | Radio Frequency Identification (RFID) | |
CN111904123A (en) | Anti-theft recording and low radio frequency signal isolation sheet for folding wallet | |
JP2007188266A (en) | Non-contact type information card |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CURIO, LTD., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HORNE, GREGORY L;REEL/FRAME:025588/0744 Effective date: 20061214 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2552); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 8 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |